default search action
Search dblp for Publications
export results for "toc:db/journals/jisys/jisys27.bht:"
@article{DBLP:journals/jisys/AliGR13, author = {Syaiful Ali and Peter F. Green and D. Alastair Robb}, title = {Measuring Top Management's {IT} Governance Knowledge Absorptive Capacity}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {137--155}, year = {2013}, url = {https://doi.org/10.2308/isys-50325}, doi = {10.2308/ISYS-50325}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/AliGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CaoNB13, author = {Jian Cao and Andreas I. Nicolaou and Somnath Bhattacharya}, title = {A Longitudinal Examination of Enterprise Resource Planning System Post-Implementation Enhancements}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {13--39}, year = {2013}, url = {https://doi.org/10.2308/isys-50398}, doi = {10.2308/ISYS-50398}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CaoNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Chakraborty13, author = {Vasundhara Chakraborty}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {333--335}, year = {2013}, url = {https://doi.org/10.2308/isys-10334}, doi = {10.2308/ISYS-10334}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Chakraborty13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CongR13, author = {Yu Cong and Jorge Romero}, title = {On Information Systems Complexity and Vulnerability}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {51--64}, year = {2013}, url = {https://doi.org/10.2308/isys-50562}, doi = {10.2308/ISYS-50562}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CongR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DavidsonDG13, author = {Bruce I. Davidson and Naman K. Desai and Gregory J. Gerard}, title = {The Effect of Continuous Auditing on the Relationship between Internal Audit Sourcing and the External Auditor's Reliance on the Internal Audit Function}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {41--59}, year = {2013}, url = {https://doi.org/10.2308/isys-50430}, doi = {10.2308/ISYS-50430}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DavidsonDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Debreceny13, author = {Roger S. Debreceny}, title = {Research on {IT} Governance, Risk, and Value: Challenges and Opportunities}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {129--135}, year = {2013}, url = {https://doi.org/10.2308/isys-10339}, doi = {10.2308/ISYS-10339}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Debreceny13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DebrecenyG13, author = {Roger S. Debreceny and Glen L. Gray}, title = {{IT} Governance and Process Maturity: {A} Multinational Field Study}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {157--188}, year = {2013}, url = {https://doi.org/10.2308/isys-50418}, doi = {10.2308/ISYS-50418}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DebrecenyG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Dilla13, author = {William N. Dilla}, title = {Can Avatars Fight Fraud? How Virtual Business Environments Facilitate Learning More About Fraud Investigation and Prevention}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {127--130}, year = {2013}, url = {https://doi.org/10.2308/isys-10371}, doi = {10.2308/ISYS-10371}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/Dilla13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DillaHMJ13, author = {William N. Dilla and Andrew J. Harrison and Brian E. Mennecke and Diane J. Janvrin}, title = {The Assets Are Virtual but the Behavior Is Real: An Analysis of Fraud in Virtual Worlds and Its Implications for the Real World}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {131--158}, year = {2013}, url = {https://doi.org/10.2308/isys-50571}, doi = {10.2308/ISYS-50571}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/DillaHMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/DuVZ13, author = {Hui Du and Miklos A. Vasarhelyi and Xiaochuan Zheng}, title = {{XBRL} Mandate: Thousands of Filing Errors and So What?}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {61--78}, year = {2013}, url = {https://doi.org/10.2308/isys-50399}, doi = {10.2308/ISYS-50399}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/DuVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/ElbashirCSDL13, author = {Mohamed Z. Elbashir and Philip A. Collier and Steve G. Sutton and Michael J. Davern and Stewart A. Leech}, title = {Enhancing the Business Value of Business Intelligence: The Role of Shared Knowledge and Assimilation}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {87--105}, year = {2013}, url = {https://doi.org/10.2308/isys-50563}, doi = {10.2308/ISYS-50563}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/ElbashirCSDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/GaillyG13, author = {Frederik Gailly and Guido L. Geerts}, title = {Ontology-Driven Business Rule Specification}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {79--104}, year = {2013}, url = {https://doi.org/10.2308/isys-50428}, doi = {10.2308/ISYS-50428}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/GaillyG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HaesGD13, author = {Steven De Haes and Wim Van Grembergen and Roger S. Debreceny}, title = {{COBIT} 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {307--324}, year = {2013}, url = {https://doi.org/10.2308/isys-50422}, doi = {10.2308/ISYS-50422}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HaesGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Heijden13, author = {Hans van der Heijden}, title = {Evaluating Dual Performance Measures on Information Dashboards: Effects of Anchoring and Presentation Format}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {21--34}, year = {2013}, url = {https://doi.org/10.2308/isys-50556}, doi = {10.2308/ISYS-50556}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Heijden13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/HerouxF13, author = {Sylvie H{\'{e}}roux and Anne Fortin}, title = {The Internal Audit Function in Information Technology Governance: {A} Holistic Perspective}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {189--217}, year = {2013}, url = {https://doi.org/10.2308/isys-50331}, doi = {10.2308/ISYS-50331}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/HerouxF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/JanvrinPM13, author = {Diane J. Janvrin and Robert E. Pinsker and Maureen Francis Mascha}, title = {XBRL-Enabled, Spreadsheet, or PDF? Factors Influencing Exclusive User Choice of Reporting Technology}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {35--49}, year = {2013}, url = {https://doi.org/10.2308/isys-50569}, doi = {10.2308/ISYS-50569}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/JanvrinPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/KwonUW13, author = {Juhee Kwon and Jackie Rees Ulmer and Tawei Wang}, title = {The Association between Top Management Involvement and Compensation and Information Security Breaches}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {219--236}, year = {2013}, url = {https://doi.org/10.2308/isys-50339}, doi = {10.2308/ISYS-50339}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/KwonUW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MoffittV13, author = {Kevin C. Moffitt and Miklos A. Vasarhelyi}, title = {{AIS} in an Age of Big Data}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {1--19}, year = {2013}, url = {https://doi.org/10.2308/isys-10372}, doi = {10.2308/ISYS-10372}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/MoffittV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PickardBM13, author = {Matthew D. Pickard and Mary B. Burns and Kevin C. Moffitt}, title = {A Theoretical Justification for Using Embodied Conversational Agents (ECAs) to Augment Accounting-Related Interviews}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {159--176}, year = {2013}, url = {https://doi.org/10.2308/isys-50561}, doi = {10.2308/ISYS-50561}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PickardBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/PrasadGH13, author = {Acklesh Prasad and Peter F. Green and Jon Heales}, title = {On Governing Collaborative Information Technology {(IT):} {A} Relational Perspective}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {237--259}, year = {2013}, url = {https://doi.org/10.2308/isys-50326}, doi = {10.2308/ISYS-50326}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/PrasadGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SchobelD13, author = {Kurt B. Schobel and James S. Denford}, title = {The Chief Information Officer and Chief Financial Officer Dyad in the Public Sector: How an Effective Relationship Impacts Individual Effectiveness and Strategic Alignment}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {261--281}, year = {2013}, url = {https://doi.org/10.2308/isys-50321}, doi = {10.2308/ISYS-50321}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SchobelD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SrivastavaRM13, author = {Rajendra P. Srivastava and Sunita S. Rao and Theodore J. Mock}, title = {Planning and Evaluation of Assurance Services for Sustainability Reporting: An Evidential Reasoning Approach}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {107--126}, year = {2013}, url = {https://doi.org/10.2308/isys-50564}, doi = {10.2308/ISYS-50564}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/SrivastavaRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/SteinbartRGD13, author = {Paul John Steinbart and Robyn L. Raschke and Graham Gal and William N. Dilla}, title = {Information Security Professionals' Perceptions about the Relationship between the Information Security and Internal Audit Functions}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {65--86}, year = {2013}, url = {https://doi.org/10.2308/isys-50510}, doi = {10.2308/ISYS-50510}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/SteinbartRGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TegardenSD13, author = {David P. Tegarden and Ludwig Christian Schaupp and Richard B. Dull}, title = {Identifying Ontological Modifications to the Resource-Event-Agent {(REA)} Enterprise Ontology Using a Bunge-Wand-Weber Ontological Evaluation}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {105--128}, year = {2013}, url = {https://doi.org/10.2308/isys-50429}, doi = {10.2308/ISYS-50429}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TegardenSD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Titera13, author = {William R. Titera}, title = {Updating Audit Standard - Enabling Audit Data Analysis}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {325--331}, year = {2013}, url = {https://doi.org/10.2308/isys-50427}, doi = {10.2308/ISYS-50427}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Titera13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Vasarhelyi13, author = {Miklos A. Vasarhelyi}, title = {Formalization of Standards, Automation, Robots, and {IT} Governance}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {1--11}, year = {2013}, url = {https://doi.org/10.2308/isys-10347}, doi = {10.2308/ISYS-10347}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Vasarhelyi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/WatanabeW13, author = {Olena Watanabe and Patrick Wheeler}, title = {Book Review}, journal = {J. Inf. Syst.}, volume = {27}, number = {2}, pages = {177--180}, year = {2013}, url = {https://doi.org/10.2308/isys-10351}, doi = {10.2308/ISYS-10351}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/WatanabeW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/Wilkin0MG13, author = {Carla Wilkin and John Campbell and Stephen Moore and Wim Van Grembergen}, title = {Co-Creating Value from {IT} in a Contracted Public Sector Service Environment: Perspectives on {COBIT} and Val {IT}}, journal = {J. Inf. Syst.}, volume = {27}, number = {1}, pages = {283--306}, year = {2013}, url = {https://doi.org/10.2308/isys-50355}, doi = {10.2308/ISYS-50355}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/Wilkin0MG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.